cut-spangle-dugout.glitch.me Open in urlscan Pro
52.3.182.213  Malicious Activity! Public Scan

Submitted URL: http://wal.ee/zhr84
Effective URL: https://cut-spangle-dugout.glitch.me/
Submission: On March 11 via manual from FR

Summary

This website contacted 4 IPs in 3 countries across 4 domains to perform 4 HTTP transactions. The main IP is 52.3.182.213, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is cut-spangle-dugout.glitch.me.
TLS certificate: Issued by Amazon on January 18th 2021. Valid for: a year.
This is the only time cut-spangle-dugout.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Facebook (Social Network)

Domain & IP information

IP Address AS Autonomous System
2 2 95.216.233.174 24940 (HETZNER-AS)
1 52.3.182.213 14618 (AMAZON-AES)
1 3 107.6.184.180 32475 (SINGLEHOP...)
1 67.202.94.94 32748 (STEADFAST)
4 4
Apex Domain
Subdomains
Transfer
3 freeinternetnow.com
freeinternetnow.com
500 KB
2 wal.ee
wal.ee
437 B
1 amung.us
whos.amung.us
29 B
1 glitch.me
cut-spangle-dugout.glitch.me
467 B
4 4
Domain Requested by
3 freeinternetnow.com 1 redirects cut-spangle-dugout.glitch.me
2 wal.ee 2 redirects
1 whos.amung.us
1 cut-spangle-dugout.glitch.me
4 4

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon
2021-01-18 -
2022-02-15
a year crt.sh
freeinternetnow.com
cPanel, Inc. Certification Authority
2021-01-22 -
2021-04-22
3 months crt.sh
whos.amung.us
Sectigo RSA Domain Validation Secure Server CA
2020-05-21 -
2022-05-21
2 years crt.sh

This page contains 1 frames:

Primary Page: https://cut-spangle-dugout.glitch.me/
Frame ID: 62C3AE0978A3EB8B6942F75A7C5FC3CB
Requests: 6 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://wal.ee/zhr84 HTTP 301
    https://wal.ee/zhr84 HTTP 301
    https://cut-spangle-dugout.glitch.me/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Page Statistics

4
Requests

100 %
HTTPS

0 %
IPv6

4
Domains

4
Subdomains

4
IPs

3
Countries

500 kB
Transfer

771 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://wal.ee/zhr84 HTTP 301
    https://wal.ee/zhr84 HTTP 301
    https://cut-spangle-dugout.glitch.me/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 1
  • https://freeinternetnow.com/location HTTP 301
  • https://freeinternetnow.com/location/

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
cut-spangle-dugout.glitch.me/
Redirect Chain
  • http://wal.ee/zhr84
  • https://wal.ee/zhr84
  • https://cut-spangle-dugout.glitch.me/
132 B
467 B
Document
General
Full URL
https://cut-spangle-dugout.glitch.me/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.182.213 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-3-182-213.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
bd9e0c5d38dfee9a2574e12a1f87582bcfe4327498969eda9659a55f325d441e

Request headers

:method
GET
:authority
cut-spangle-dugout.glitch.me
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Thu, 11 Mar 2021 18:44:54 GMT
content-type
text/html; charset=utf-8
content-length
132
x-amz-id-2
4mZbHGdeBlWZybl8pNdD6HWLQ2cUyTJqmNdnmBqvBLVpcWLB2e1PI8rfF2FAbbFQQ+m5fc9ijF8=
x-amz-request-id
55ATKNYTSCKJ5X09
last-modified
Thu, 11 Mar 2021 17:53:14 GMT
etag
"cf09919b6430f059b58453fff1814869"
cache-control
no-cache
x-amz-version-id
3IrINDHU.Nw1n9.s5aGDySzmz70F5cpa
accept-ranges
bytes
server
AmazonS3

Redirect headers

Server
nginx
Date
Thu, 11 Mar 2021 18:44:53 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
X-Robots-Tag
noindex
Location
https://cut-spangle-dugout.glitch.me
/
freeinternetnow.com/
717 KB
499 KB
Script
General
Full URL
https://freeinternetnow.com/?api=1&lan=fbnormal&ht=1&counter0=capital01
Requested by
Host: cut-spangle-dugout.glitch.me
URL: https://cut-spangle-dugout.glitch.me/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
107.6.184.180 Amsterdam, Netherlands, ASN32475 (SINGLEHOP-LLC, US),
Reverse DNS
europe-60.banahosting.com
Software
/
Resource Hash
4ac5b2d17a881dd05047b237f28504d3dc8622d0dcfdddedd051b25196b599d9

Request headers

Referer
https://cut-spangle-dugout.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 11 Mar 2021 18:44:52 GMT
content-encoding
br
vary
Accept-Encoding
content-type
application/javascript
cache-control
no-store, no-cache, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000
expires
Thu, 19 Nov 1981 08:52:00 GMT
/
freeinternetnow.com/location/
Redirect Chain
  • https://freeinternetnow.com/location
  • https://freeinternetnow.com/location/
1 KB
526 B
Script
General
Full URL
https://freeinternetnow.com/location/
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
107.6.184.180 Amsterdam, Netherlands, ASN32475 (SINGLEHOP-LLC, US),
Reverse DNS
europe-60.banahosting.com
Software
/
Resource Hash
1ab267dd85e11f67ad2889891a03828c60b20b11c7eed80b3c899bd3f32353d7

Request headers

Referer
https://cut-spangle-dugout.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Thu, 11 Mar 2021 18:44:52 GMT
content-encoding
br
expires
Thu, 18 Mar 2021 18:44:52 GMT
cache-control
public, max-age=604800
content-length
433
vary
Accept-Encoding
content-type
application/javascript

Redirect headers

location
https://freeinternetnow.com/location/
date
Thu, 11 Mar 2021 18:44:52 GMT
content-length
707
content-type
text/html
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1230532f79456753fb73f559ece9b95c17cfb36325dc313a3eda5ac22dfd9a2b

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
/
whos.amung.us/pingjs/
29 B
29 B
Image
General
Full URL
https://whos.amung.us/pingjs/?k=capital01&t=Amung&c=s&x=https://whos.amung.us/&y=https://whos.amung.us/&a=-1&d=0&v=27&r=4781
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
67.202.94.94 , United States, ASN32748 (STEADFAST, US),
Reverse DNS
amung.us
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://cut-spangle-dugout.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Thu, 11 Mar 2021 18:44:54 GMT
content-encoding
gzip
content-type
text/javascript;charset=UTF-8
truncated
/
51 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7281941fed81ed9caf5728727e05da4a94b442c36796e1a5b1d6106f242ed11f

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Facebook (Social Network)

25 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated string| back boolean| ignoreHistoryChange boolean| ignoreHashChange boolean| IS_MOBILE number| limit_bot string| object string| type string| OUTPUT object| ___ object| params number| tt undefined| to_object string| a function| checking function| creatingInput function| searchingForms

0 Cookies

2 Console Messages

Source Level URL
Text
console-api log URL: https://freeinternetnow.com/?api=1&lan=fbnormal&ht=1&counter0=capital01(Line 101)
Message:
[object HTMLScriptElement]
console-api log URL: https://freeinternetnow.com/?api=1&lan=fbnormal&ht=1&counter0=capital01(Line 101)
Message:
[object HTMLScriptElement]